In the four-state two-way deterministic quantum key distribution (DQKD) protocol, Bob prepares a qubit randomly in one of four states and sends it to Alice. Alice encodes her key bit on the arrival qubit and returns it to Bob who measures the redux qubit to decode Alice’s key bit in a deterministic manner, without basis reconciliation. The unconditional security of the final key of this protocol has been proven in the ideal-device settings. Recently, it has been proven that two-way DQKD protocol is immune to all detector side channel attacks in the backward line A-to-B. In this paper, we study the security of two-way DQKD against passive detector side channel attacks in the forward line B-to-A. In a passive detector side channel attack, the eavesdropper Eve does not disturb quantum state of travel photon but utilizes the efficiency mismatch of two single-photon detectors to estimate the value of key bits, such as the time-shift attack. We prove that two-way DQKD is immune against all passive detector side channel attacks in the forward line B-to-A, although such attacks are efficient on BB84 protocol.
Quantum Information Processing – Springer Journals
Published: Aug 6, 2015
It’s your single place to instantly
discover and read the research
that matters to you.
Enjoy affordable access to
over 18 million articles from more than
15,000 peer-reviewed journals.
All for just $49/month
Query the DeepDyve database, plus search all of PubMed and Google Scholar seamlessly
Save any article or search result from DeepDyve, PubMed, and Google Scholar... all in one place.
All the latest content is available, no embargo periods.
“Whoa! It’s like Spotify but for academic articles.”@Phil_Robichaud